Back to EveryPatent.com
United States Patent | 6,108,434 |
Cox ,   et al. | August 22, 2000 |
Detection of a watermark in blocks of video or image data which has been subjected to affine geometric distortion is accomplished by approximating the distortion by a spatially varying translation of the blocks. The watermark is extracted by spatial translations of the blocks based on an assumed affine geometric distortion. The extracted watermarks are correlated with possible watermarks and the maximum correlator output is tested for statistical significance in order to determine whether a watermark is present in the image or video frame. The data may be compressed or uncompressed data. If the affine geometric distortion is known, a search for the maximum correlator output over a space of possible distortions can be performed.
Inventors: | Cox; Ingemar J. (Lawrenceville, NJ); Miller; Matthew L. (Princeton, NJ) |
Assignee: | Signafy, Inc. (Princeton, NJ) |
Appl. No.: | 928576 |
Filed: | September 12, 1997 |
Current U.S. Class: | 382/100 |
Intern'l Class: | G06K 009/00 |
Field of Search: | 382/232,233,100,295,275,289,296 380/54 |
4939515 | Jul., 1990 | Adelson | 341/51. |
5319735 | Jun., 1994 | Preuss et al. | 395/2. |
5530751 | Jun., 1996 | Morris | 380/4. |
5530759 | Jun., 1996 | Braudaway et al. | 380/54. |
5568570 | Oct., 1996 | Rabbani | 382/238. |
5613004 | Mar., 1997 | Cooperman et al. | 380/28. |
5636292 | Jun., 1997 | Rhoads | 382/232. |
5646997 | Jul., 1997 | Barton | 380/23. |
5659726 | Aug., 1997 | Sandford, II et al. | 395/612. |
5664018 | Sep., 1997 | Leighton | 380/54. |
5687236 | Nov., 1997 | Moskowitz et al. | 380/28. |
5710834 | Jan., 1998 | Rhoads | 382/232. |
Foreign Patent Documents | |||
0690595 | Jan., 1995 | EP. | |
2196167 | Apr., 1988 | GB. | |
8908915 | Sep., 1989 | WO. | |
9520291 | Jul., 1995 | WO. | |
9621290 | Jul., 1996 | WO | . |
9625005 | Aug., 1996 | WO | . |
9627259 | Sep., 1996 | WO. |
Wolfram Szepanski, "A signal theoretic method for creating forgery-proof documents for automatic verification", Proceedings 1979 Carnahan Conference on Crime Countermeasures, pp. 101-109, May 16-18, 1979. R.G. Van Schyndel et al, "A digital watermark," in Intl. Conf. On Image Processing, vol. 2, pp. 86-90, 1994. G. Caronni, "Assuring Ownership Rights for Digital Images," in Proc. Reliable IT Systems, VIS '95, 1995. J. Brassil et al, "Electronic Marking and Identification Techniques to Discourage Document Copying," in Proc. Infocom '94, pp. 1278-1287, 1994. K. Tanaka et al, "Embedding Secret Information into a Dithered Multi-level Image," in IEEE Military Comm. Conf., pp. 216-220, 1990. K. Mitsui et al, "Video-Steganography: How to Secretly Embed a Signature in a Picture," in IMA Intellectual Property Project Proc., vol. 1, pp. 187-206, 1994. Macq and Quisquater, "Cryptology for Digital TV Broadcasting," in Proc. of the IEEE, vol. 83, No. 6, pp. 944-957, 1995. W. Bender et al, "Techniques for data hiding," in Proc. of SPIE, vol. 2420, No. 40, Jul. 1995. Koch, Rindfrey and Zhao, "Copyright Protection for Multimedia Data," in Proc. of the Int'l Conf. on Digital Media and Electronic Publishing (Leeds, UK, Dec. 6-8, 1994). Koch and Zhao, "Towards Robust and Hidden Image Copyright Labeling," in Proc. of 1995 IEEE Workshop on Nonlinear Signal and Image Processing (Neos Marmaras, Halkidiki, Greece, Jun. 20-22, 1995. Zhao and Koch, "Embedding Robust Labels Into Images For Copyright Protection," in Proc. Int. Congr. on IPR for Specialized Information, Knowledge and New Technologies (Vienna, Austria), Aug. 21-25, 1995. "Digital Copyright: Who Owns What?" NewMedia, Sep. 1995, pp. 38-43. "Publish and Be Robbed?" New Scientist, Feb. 18, 1995, pp. 32-37. Kohno et al, "Spread Spectrum Access Methods for Wireless Communications," in IEEE Communications Magazine, Jan. 1995, pp. 58-67, I16. Campana and Quinn, "Spread spectrum communications," in IEEE Potentials, Apr. 1993, pp. 13-16. Mowbray and Grant, "Wideband coding for uncoordinated multiple access communication," in Electronics & Communication Engineering Journal, Dec. 1992, pp. 351-361. Digimarc Overview & "Wired" Magazine article (Jul. 1995 issue)-Jun. 1995. A.G. Bors et al., "Image Watermarking Using DCT Domain Constraint", Dept. Of Informatics, University of Thessaloniki. I.J. Cox et al., "Secure Spread Spectrum Watermarking for Multimedia", NEC Research Institute, Technical Report 95-10. H.S. Stone, "Analysis of Attacks on Image Watermarks with Randomized Coefficients", NEC Research Institute, May 17, 1996. F.M. Boland et al., "Watermarking Digital Images for Copyright Protection", Image Processing and its Applications, Jul. 4-6, 1995, Conference Publication No. 410, pp. 326-330. L. Boney et al., "Digital Watermarks for Audio Signals". Swanson et al., "Transparent Robust Image Watermarking", Proc. IEEE Int. Conf. On Image Proc. 1996. J.J.K. O Ruanaidh et al., "Phase Watermarking of Digital Images". I. Pitas, "A Method for Signature Casting on Digital Images". C.T. Hsu et al., "Hidden Signatures in Images", ICIP 96 Conf. Proc., Sep. 16-19, 1996. M. Schneider et al., "A Robust Content Based Digital Signature for Image Authentication", ICIP 96 Conf. Proc., Sep. 16-19, 1996. S. Roche et al., "Multi-Resolution Access Control Algorithm Based on Fractal Coding", ICIP 96 Conf. Proc., Sep. 16-19, 1996. K. Hirotsugu, "An Image Digital Signature System with ZKIP for the Graph Isomorphism", ICIP 96 Conf. Proc., Sep. 16-19, 1996. R.B. Wolfgang et al., "A Watermark for Digital Images". J.J.K. O Ruanaidh et al., "Watermarking Digital Images for Copyright Protection", EVA 96 Florence, pp. 1-7. T. Aura, "Invisible Communication", Nov. 6, 1995. D. Kahn, "Information Hiding--An Annotated Bibliography", Macmillan 1967, Library of Congress catalog No. 63-16109. Craver et al., "Can Invisible Watermarks Resolve Rightful Ownership?", IBM Research Report. Podilchuk et al., "Digital Image Watermarking Using Visual Models", Proc. of EI'97, vol. 3016, Feb. 9-14, 1997. Cox et al., "A review of watermarking and the importance of perceptual modeling", Proc. of EI'97, vol. 3016, Feb. 9-14, 1997. Watson, "DCT quantization matrices visually optimized for individual images", SPIE, vol. 1913, pp. 202-216. Ahumada, Jr. et al., "Luminance-Model-Based DCT Quantization for Color Image Compression", SPIE, vol. 1666 (1992), pp. 365-374. Hartung et al., "Digital Watermarking of Raw and Compressed Video", Systems for Video Communication, Oct. 1996, pp. 205-213. |
______________________________________ g = "scaling group" (i.e. the number of sets of 38 accumulators used) sx = 0 sy = 0 For each of g frames Add ONLY the blocks that must be shifted by sx pixels to the right and sy pixels upward into the single set of 8 x 8 accumulators. Ignore all the other blocks. Compute IDCTs on the accumulators. Shift the accumulators left one pixel. sx = (sx + 1) .div. 8 if (sx == 0) { Shift the accumulators down one pixel. sy = (sy + 1) .div. 8 } Compute DCTs on the accumulators. } ______________________________________